Secure computing with the MPEG RVC framework

Cite This

Files in this item

Checksum: MD5:cc53559ece16bff2aa3bed29c6e57e35

AHMAD, Junaid Jameel, Shujun LI, Richard THAVOT, Marco MATTAVELLI, 2013. Secure computing with the MPEG RVC framework. In: Signal Processing: Image Communication. 28(10), pp. 1315-1334. ISSN 0923-5965. eISSN 1879-2677. Available under: doi: 10.1016/j.image.2013.08.015

@article{Ahmad2013Secur-26663, title={Secure computing with the MPEG RVC framework}, year={2013}, doi={10.1016/j.image.2013.08.015}, number={10}, volume={28}, issn={0923-5965}, journal={Signal Processing: Image Communication}, pages={1315--1334}, author={Ahmad, Junaid Jameel and Li, Shujun and Thavot, Richard and Mattavelli, Marco} }

<rdf:RDF xmlns:dcterms="" xmlns:dc="" xmlns:rdf="" xmlns:bibo="" xmlns:dspace="" xmlns:foaf="" xmlns:void="" xmlns:xsd="" > <rdf:Description rdf:about=""> <dc:creator>Li, Shujun</dc:creator> <dcterms:abstract xml:lang="eng">Recently, ISO/IEC standardized a dataflow-programming framework called Reconfigurable Video Coding (RVC) for the specification of video codecs. The RVC framework aims at providing the specification of a system at a high abstraction level so that the functionality (or behavior) of the system become independent of implementation details. The idea is to specify a system so that only intrinsic features of the algorithms are explicitly expressed, whereas implementation choices can then be made only once specific target platforms have been chosen. With this system design approach, one abstract design can be used to automatically create implementations towards multiple target platforms. In this paper, we report our investigations on applying the methodology standardized by the MPEG RVC framework to develop secure computing in the domains of cryptography and multimedia security, leading to the conclusion that the RVC framework can successfully be applied as a general-purpose framework to other fields beyond multimedia coding. This paper also highlights the challenges we faced in conducting our study, and how our study helped the RVC and the secure computing communities benefited from each other. Our investigations started with the development of a Crypto Tools Library (CTL) based on RVC, which covers a number of widely used ciphers and cryptographic hash functions such as AES, Triple DES, ARC4 and SHA-2. Performance benchmarking results on the RVC-based AES and SHA-2 implementations in both C and Java revealed that the automatically generated implementations can achieve a comparable performance to some manually written reference implementations. We also demonstrated that the RVC framework can easily produce implementations with multi-core support without any change to the RVC code. A security protocol for mutual authentication was also implemented to demonstrate how one can build heterogeneous systems easily with RVC. By combining CTL with Video Tool Library (a standard library defined by the RVC standard), a non-standard RVC-based H.264/AVC encoder and a non-standard RVC-based JPEG codec, we further demonstrated the benefits of using RVC to develop different kinds of multimedia security applications, which include joint multimedia encryption-compression schemes, digital watermarking and image steganography in JPEG compressed domain. Our study has shown that RVC can be used as a general-purpose implementation-independent development framework for diverse data-driven applications with different complexities.</dcterms:abstract> <dc:contributor>Mattavelli, Marco</dc:contributor> <dcterms:bibliographicCitation>Signal Processing : Image Communication ; 28 (2013), 10. - S. 1315–1334</dcterms:bibliographicCitation> <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/> <dcterms:rights rdf:resource=""/> <foaf:homepage rdf:resource="http://localhost:8080/jspui"/> <dc:creator>Ahmad, Junaid Jameel</dc:creator> <dcterms:available rdf:datatype="">2014-03-04T15:54:19Z</dcterms:available> <dc:date rdf:datatype="">2014-03-04T15:54:19Z</dc:date> <dc:creator>Thavot, Richard</dc:creator> <dc:creator>Mattavelli, Marco</dc:creator> <dcterms:isPartOf rdf:resource=""/> <dcterms:hasPart rdf:resource=""/> <dc:contributor>Thavot, Richard</dc:contributor> <dc:contributor>Ahmad, Junaid Jameel</dc:contributor> <dspace:hasBitstream rdf:resource=""/> <dcterms:title>Secure computing with the MPEG RVC framework</dcterms:title> <dc:language>eng</dc:language> <dcterms:issued>2013</dcterms:issued> <dspace:isPartOfCollection rdf:resource=""/> <bibo:uri rdf:resource=""/> <dc:contributor>Li, Shujun</dc:contributor> <dc:rights>terms-of-use</dc:rights> </rdf:Description> </rdf:RDF>

Downloads since Oct 1, 2014 (Information about access statistics)

Ahmad_266632.pdf 580

This item appears in the following Collection(s)

Search KOPS


My Account